Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-29041

Опубликовано: 12 апр. 2022
Источник: redhat
CVSS3: 6.4

Описание

Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

A flaw was found in the Jenkins Jira plugin. The Jenkins Jira plugin does not escape the name and description of a Jira Issue and Jira Release Version parameters on views displaying parameters. This issue results in a stored Cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsNot affected
Red Hat OpenShift Container Platform 4.10jenkins-2-pluginsFixedRHSA-2022:160002.05.2022
Red Hat OpenShift Container Platform 4.9jenkins-2-pluginsFixedRHSA-2022:220518.05.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2074850Jira: Stored XSS vulnerabilities in Jenkins Jira plugin

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
почти 4 года назад

Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVSS3: 5.4
github
почти 4 года назад

Stored Cross-site Scripting vulnerability in Jenkins Jira Plugin

6.4 Medium

CVSS3